Skip to content
View moza369's full-sized avatar
πŸ˜€
Happy
πŸ˜€
Happy

Highlights

  • Pro

Block or report moza369

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
moza369/README.md

πŸ‘‹ Mohamed Zahir | AI Student & Aspiring Penetration Tester

Focused on Offensive Security πŸ›‘οΈ | Tool Builder | FP Nador


πŸ‘¨β€πŸ’» About Me

  • πŸŽ“ Master in AI & Emerging Technologies student at FP Nador
  • πŸ› οΈ Software Engineer (FST Errachidia Alumnus)
  • πŸ”’ Passionate about Offensive Security, Bug Bounties, and Penetration Testing
  • πŸ› οΈ I design and build automation tools for recon, exploitation, and reporting
  • 🌱 Currently learning: Application Security (AppSec), Active Directory (AD) pentesting (starting), mobile pentesting (starting), and Django
  • πŸ’‘ Building: a new Django project for authenticated vuln scanner/dashboard & internal tools
  • πŸš€ Open to internships and junior roles in Cybersecurity or Software Development

πŸš€ My Toolkit & Technologies

python logo c logo bash logo linux logo git logo github logo java logo php logo mysql logo html5 logo javascript logo django logo

πŸ”‘ Security Arsenal (Web-Focused)

Web & API Security

  • OWASP Top 10: XSS, SQLi, CSRF, IDOR, Broken Authentication, Misconfigurations, Sensitive Data Exposure ...
  • API testing: JWT/bearer flaws, auth bypasses, rate-limit & logic abuses ...
  • Server-side vulnerabilities: SSRF, template injection ...
  • Auth/session attacks: brute force, session fixation, cookie misconfig, MFA bypass attempts ...
  • Attack automation with Python scripts & safe PoCs ...

Manual + Automated Workflows

  • Combining DAST with manual verification
  • Secure code review: logic flaws, insecure APIs, backend/frontend vulnerabilities
  • Fuzzing for web inputs & APIs

Web Tooling & Techniques

  • Proxy-based testing (Burp/Caido)
  • Authenticated testing + headless browser automation
  • TLS/cert checks, CSP & header validation

Custom Tooling & Reporting

  • Python tools for recon & structured outputs
  • Professional reporting: reproducible PoCs, risk scoring, remediation guidance

πŸ“‚ Featured Projects

  • πŸ”Ž Vulnerability Scanner Web App with Django (coming soon) – persistent scanner with editing/deleting of results, focused on automation and clear reporting
  • πŸ•΅οΈ Recon Automation Tool – Python-based recon framework with structured outputs for triage
  • πŸ› οΈ Django Project (In progress) – building a new Django app for authenticated dashboards & scan management

πŸ“ˆ Stats & Activity

stats graph languages graph

trophy


🀝 Connect with Me


Pinned Loading

  1. ciora ciora Public

    Ciora is a Bash-based recon automation tool built for bug bounty hunters and pentesters. It downloads the HackerOne program scope (public or private with session cookie), extracts web assets & wild…

    Shell 2